Module 3 - Law, Privacy and Ethics Review Questions--Answered---Version 7-1
.docx
keyboard_arrow_up
School
Collin County Community College District *
*We aren’t endorsed by this school
Course
2341
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by DeaconTurkey1941
Module 3 - Law, Privacy, and Ethics
1.
Define the following terms:
a.
Due Care---Slide 42
b.
Due Diligence—Slide 42
c.
Ethics—slide 73
d.
Morality—Slide 72
2.
What is a Non-Disclosure Agreement? Non-Disclosure Agreement and Privacy Impact Assessment Class Exercises slide 3
3.
What is the difference between Policy and Law? Slide 5
4.
According Shawn Tuma’s, “What is Reasonable Security” video, who defines what is reasonable for an organization? Slide 36
5.
According Shawn Tuma’s, “What is Reasonable Security” video, what is the first step in identifying what risks an organization faces? Slide 36
6.
According Shawn Tuma’s, “What is Reasonable Security” video, an organization must implement appropriate? Slide 36
7.
According Shawn Tuma’s, “Reasonable Cybersecurity Guidelines” video, an organizations that care about cybersecurity can? Slide 37
8.
Is Information Security the same as Privacy? Elaborate why or why not. Slide 52-53
9.
What the Seven Fair Information Practices are as identified in this course? Slide 48
10. What is the principal difference between US Privacy Law and most other countries, such as Canada or the European Union? Slide 56
11. Is there a process to analyze effects of Privacy in Information Systems’ Programs? Yes If so, what is such a process called? Privacy Impact Assessment/Analysis
12. When should a Privacy Impact Assessment/Analysis be accomplished? Non-Disclosure Agreement and Privacy Impact Assessment Class Exercises slide 9.
13. Can I take software that I produced at one organization to another? Elaborate why or why not. It depends, Slide 25
14. Can an employee be terminated for downloading and operating a gambling web site within an organization’s DMZ? It Depends Elaborate why or why not. Slide 5
15. Breaches of data privacy, data security can result in what? Slide 55-56
16. What are some of the best practices in regards to data security and privacy audit according to the Privacy presentation? Slides 61-65
17. What are some of the best practices in regards to addressing a data breach according to the Privacy presentation? Slide 66
18. What are the 4 primary functions Professional Codes? Slide 79
19. What steps should one go through if faced with an Ethical dilemma? Slide 76
20. What Collin College document outlines Student’s code of ethics? Slide 82
21. What is the best method for preventing an illegal or unethical activity? Slide 84-85
22. What is a written Information security program plan and what state breach law requires this? Written document that outlines/describes your Information Security Program, Massachusetts Statute discussed in Reasonable Exercise and Slide 30
23. What state’s data security law is the first to implement a GDPR-like law? Slide 30, California
24. Do all states and District of Colombia now have data security laws? Yes, as of 2018 all states now have a data security law on their books, Slide 29
25. What is Payment Card Industry (PCI)? It is a.
A set of requirements designed to ensure that ALL organizations that store, process, or transmit cardholder data do so in a secure environment
b.
An industry regulation.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help